Total
2452 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2018-18555 | 1 Vyos | 1 Vyos | 2019-10-02 | 9.0 HIGH | 9.9 CRITICAL |
A sandbox escape issue was discovered in VyOS 1.1.8. It provides a restricted management shell for operator users to administer the device. By issuing various shell special characters with certain commands, an authenticated operator user can break out of the management shell and gain access to the underlying Linux shell. The user can then run arbitrary operating system commands with the privileges afforded by their account. | |||||
CVE-2018-17867 | 1 Dasannetworks | 2 H660gw, H660gw Firmware | 2019-10-02 | 9.0 HIGH | 7.2 HIGH |
The Port Forwarding functionality on DASAN H660GW devices allows remote attackers to execute arbitrary code via shell metacharacters in the cgi-bin/adv_nat_virsvr.asp Addr parameter (aka the Local IP Address field). | |||||
CVE-2018-17787 | 1 D-link | 2 Dir-823g, Dir-823g Firmware | 2019-10-02 | 7.5 HIGH | 9.8 CRITICAL |
On D-Link DIR-823G devices, the GoAhead configuration allows /HNAP1 Command Injection via shell metacharacters in the POST data, because this data is sent directly to the "system" library function. | |||||
CVE-2018-17565 | 1 Grandstream | 12 Gxp1610, Gxp1610 Firmware, Gxp1615 and 9 more | 2019-10-02 | 10.0 HIGH | 9.8 CRITICAL |
Shell Metacharacter Injection in the SSH configuration interface on Grandstream GXP16xx VoIP 1.0.4.128 phones allows attackers to execute arbitrary system commands and gain a root shell. | |||||
CVE-2018-17228 | 1 Nmap4j Project | 1 Nmap4j | 2019-10-02 | 7.5 HIGH | 9.8 CRITICAL |
nmap4j 1.1.0 allows attackers to execute arbitrary commands via shell metacharacters in an includeHosts call. | |||||
CVE-2018-17208 | 1 Linksys | 2 Velop, Velop Firmware | 2019-10-02 | 9.3 HIGH | 8.8 HIGH |
Linksys Velop 1.1.2.187020 devices allow unauthenticated command injection, providing an attacker with full root access, via cgi-bin/zbtest.cgi or cgi-bin/zbtest2.cgi (scripts that can be discovered with binwalk on the firmware, but are not visible in the web interface). This occurs because shell metacharacters in the query string are mishandled by ShellExecute, as demonstrated by the zbtest.cgi?cmd=level&level= substring. This can also be exploited via CSRF. | |||||
CVE-2018-5347 | 1 Seagate | 2 Personal Cloud, Personal Cloud Firmware | 2019-10-02 | 10.0 HIGH | 9.8 CRITICAL |
Seagate Media Server in Seagate Personal Cloud has unauthenticated command injection in the uploadTelemetry and getLogs functions in views.py because .psp URLs are handled by the fastcgi.server component and shell metacharacters are mishandled. | |||||
CVE-2018-17068 | 1 D-link | 2 Dir-816 A2, Dir-816 A2 Firmware | 2019-10-02 | 10.0 HIGH | 9.8 CRITICAL |
An issue was discovered on D-Link DIR-816 A2 1.10 B05 devices. An HTTP request parameter is used in command string construction in the handler function of the /goform/Diagnosis route. This could lead to command injection via shell metacharacters in the sendNum parameter. | |||||
CVE-2018-17066 | 1 D-link | 2 Dir-816 A2, Dir-816 A2 Firmware | 2019-10-02 | 10.0 HIGH | 9.8 CRITICAL |
An issue was discovered on D-Link DIR-816 A2 1.10 B05 devices. An HTTP request parameter is used in command string construction in the handler function of the /goform/form2systime.cgi route. This could lead to command injection via shell metacharacters in the datetime parameter. | |||||
CVE-2018-17064 | 1 D-link | 2 Dir-816 A2, Dir-816 A2 Firmware | 2019-10-02 | 10.0 HIGH | 9.8 CRITICAL |
An issue was discovered on D-Link DIR-816 A2 1.10 B05 devices. An HTTP request parameter is used in command string construction within the handler function of the /goform/sylogapply route. This could lead to command injection via the syslogIp parameter after /goform/clearlog is invoked. | |||||
CVE-2018-17063 | 1 D-link | 2 Dir-816 A2, Dir-816 A2 Firmware | 2019-10-02 | 10.0 HIGH | 9.8 CRITICAL |
An issue was discovered on D-Link DIR-816 A2 1.10 B05 devices. An HTTP request parameter is used in command string construction within the handler function of the /goform/NTPSyncWithHost route. This could lead to command injection via shell metacharacters. | |||||
CVE-2018-16752 | 1 Linknet-usa | 2 Lw-n605r, Lw-n605r Firmware | 2019-10-02 | 9.0 HIGH | 8.8 HIGH |
LINK-NET LW-N605R devices with firmware 12.20.2.1486 allow Remote Code Execution via shell metacharacters in the HOST field of the ping feature at adm/systools.asp. Authentication is needed but the default password of admin for the admin account may be used in some cases. | |||||
CVE-2018-16744 | 1 Mgetty Project | 1 Mgetty | 2019-10-02 | 4.6 MEDIUM | 7.8 HIGH |
An issue was discovered in mgetty before 1.2.1. In fax_notify_mail() in faxrec.c, the mail_to parameter is not sanitized. It could allow for command injection if untrusted input can reach it, because popen is used. | |||||
CVE-2018-16741 | 2 Debian, Mgetty Project | 2 Debian Linux, Mgetty | 2019-10-02 | 7.2 HIGH | 7.8 HIGH |
An issue was discovered in mgetty before 1.2.1. In fax/faxq-helper.c, the function do_activate() does not properly sanitize shell metacharacters to prevent command injection. It is possible to use the ||, &&, or > characters within a file created by the "faxq-helper activate <jobid>" command. | |||||
CVE-2018-16232 | 1 Ipfire | 1 Ipfire | 2019-10-02 | 6.5 MEDIUM | 8.8 HIGH |
An authenticated command injection vulnerability exists in IPFire Firewall before 2.21 Core Update 124 in backup.cgi. This allows an authenticated user with privileges for the affected page to execute arbitrary commands. | |||||
CVE-2018-16216 | 1 Audiocodes | 2 405hd, 405hd Firmware | 2019-10-02 | 7.7 HIGH | 8.0 HIGH |
A command injection (missing input validation, escaping) in the monitoring or memory status web interface in AudioCodes 405HD (firmware 2.2.12) VoIP phone allows an authenticated remote attacker in the same network as the device to trigger OS commands (like starting telnetd or opening a reverse shell) via a POST request to the web server. In combination with another attack (unauthenticated password change), the attacker can circumvent the authentication requirement. | |||||
CVE-2018-16184 | 1 Ricoh | 16 D2200, D2200 Firmware, D5500 and 13 more | 2019-10-02 | 10.0 HIGH | 9.8 CRITICAL |
RICOH Interactive Whiteboard D2200 V1.6 to V2.2, D5500 V1.6 to V2.2, D5510 V1.6 to V2.2, and the display versions with RICOH Interactive Whiteboard Controller Type1 V1.6 to V2.2 attached (D5520, D6500, D6510, D7500, D8400) allows remote attackers to execute arbitrary commands via unspecified vectors. | |||||
CVE-2018-16130 | 1 Mi | 2 Mi Router 3, Miwifi Os | 2019-10-02 | 9.0 HIGH | 8.8 HIGH |
System command injection in request_mitv in Xiaomi Mi Router 3 version 2.22.15 allows attackers to execute arbitrary system commands via the "payload" URL parameter. | |||||
CVE-2018-16146 | 1 Opsview | 1 Opsview | 2019-10-02 | 9.0 HIGH | 7.2 HIGH |
The web management console of Opsview Monitor 5.4.x before 5.4.2 provides functionality accessible by an authenticated administrator to test notifications that are triggered under certain configurable events. The value parameter is not properly sanitized, leading to arbitrary command injection with the privileges of the nagios user account. | |||||
CVE-2018-16090 | 1 Lenovo | 8 System Management Module Firmware, Thinkagile Hx Enclosure 7x81, Thinkagile Hx Enclosure 7y87 and 5 more | 2019-10-02 | 6.0 MEDIUM | 7.5 HIGH |
In System Management Module (SMM) versions prior to 1.06, the SMM certificate creation and parsing logic is vulnerable to post-authentication command injection. |